A General Approach to Bypassing Many Kernel Protections and Its Mitigation
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive analysis of kernel protection bypasses in this 41-minute Black Hat conference talk. Begin by examining an anecdotal exploit that circumvents KASLR using flexible objects in the Linux kernel. Delve into the extended concept of elastic objects and discover how this exploitation technique serves as a general approach. Gain insights from speakers Yueqi Chen, Zhenpeng Lin, and Xinyu Xing as they present their findings on bypassing various kernel protections and discuss potential mitigation strategies.
Syllabus
A General Approach to Bypassing Many Kernel Protections and its Mitigation
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network